Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
e205e8cf80a03357f2fe15197b9890a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e205e8cf80a03357f2fe15197b9890a2.exe
Resource
win10v2004-20240319-en
General
-
Target
e205e8cf80a03357f2fe15197b9890a2.exe
-
Size
1000KB
-
MD5
e205e8cf80a03357f2fe15197b9890a2
-
SHA1
346dfc9ee528d36602621b56797c092188cdccaf
-
SHA256
b265937cf5622551c7c18b4008c0177c5e9386ecc3356f6240d160461255630f
-
SHA512
9bb8d3b44f8d5302b799d2a72a4be3e4dad8a5a3ef0d2233338653276366fe82a426c90b6306cae2d8f25653f921fd42696a722c7cd94c3f99f54c6dd813a922
-
SSDEEP
24576:EbIeZBuGjztZTMe7zWEv1B+5vMiqt0gj2ed:HeigZTMCLqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 e205e8cf80a03357f2fe15197b9890a2.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 e205e8cf80a03357f2fe15197b9890a2.exe -
Loads dropped DLL 1 IoCs
pid Process 2292 e205e8cf80a03357f2fe15197b9890a2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2716 e205e8cf80a03357f2fe15197b9890a2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2716 e205e8cf80a03357f2fe15197b9890a2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2292 e205e8cf80a03357f2fe15197b9890a2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2292 e205e8cf80a03357f2fe15197b9890a2.exe 2716 e205e8cf80a03357f2fe15197b9890a2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2716 2292 e205e8cf80a03357f2fe15197b9890a2.exe 28 PID 2292 wrote to memory of 2716 2292 e205e8cf80a03357f2fe15197b9890a2.exe 28 PID 2292 wrote to memory of 2716 2292 e205e8cf80a03357f2fe15197b9890a2.exe 28 PID 2292 wrote to memory of 2716 2292 e205e8cf80a03357f2fe15197b9890a2.exe 28 PID 2716 wrote to memory of 2708 2716 e205e8cf80a03357f2fe15197b9890a2.exe 29 PID 2716 wrote to memory of 2708 2716 e205e8cf80a03357f2fe15197b9890a2.exe 29 PID 2716 wrote to memory of 2708 2716 e205e8cf80a03357f2fe15197b9890a2.exe 29 PID 2716 wrote to memory of 2708 2716 e205e8cf80a03357f2fe15197b9890a2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exe"C:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exeC:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
1000KB
MD51d9a872342c734ec0a093dff4f6e282a
SHA1e253ff6018f63de226fbb9471d08b4e5e217b009
SHA256b27f9284a9eb2cae87078e6af963941cd02e92d0d86aed874c8f6cfcda735077
SHA512eae4fa618a6ee961cbf5e75594a7e701902502a6a7b557ccce6629972a9641b4e6b2b2cfeff4443312e48c565ecd3812b6e3d6ba9809032d5f550e2f1b7b6132